I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000297-CTR-000705
<GroupDescription></GroupDescription>Group -
OpenShift must display an explicit logout message indicating the reliable termination of authenticated communication sessions.
<VulnDiscussion>The OpenShift CLI tool includes an explicit logout option. The web console's default logout will invalidate the user's sess...Rule Low Severity -
SRG-APP-000342-CTR-000775
<GroupDescription></GroupDescription>Group -
Container images instantiated by OpenShift must execute using least privileges.
<VulnDiscussion>Container images running on OpenShift must support running as any arbitrary UID. OpenShift will then assign a random, nonpriv...Rule High Severity -
SRG-APP-000357-CTR-000800
<GroupDescription></GroupDescription>Group -
Red Hat Enterprise Linux CoreOS (RHCOS) must allocate audit record storage capacity to store at least one weeks' worth of audit records, when audit records are not immediately sent to a central audit record storage facility.
<VulnDiscussion>To ensure RHCOS has a sufficient storage capacity in which to write the audit logs, operating systems need to be able to allo...Rule Low Severity -
SRG-APP-000360-CTR-000815
<GroupDescription></GroupDescription>Group -
OpenShift must configure Alert Manger Receivers to notify SA and ISSO of all audit failure events requiring real-time alerts.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-APP-000381-CTR-000905
<GroupDescription></GroupDescription>Group -
OpenShift must enforce access restrictions and support auditing of the enforcement actions.
<VulnDiscussion>Enforcing access restrictions helps protect the OpenShift environment and its resources from unauthorized access, misuse, or ...Rule Medium Severity -
SRG-APP-000384-CTR-000915
<GroupDescription></GroupDescription>Group -
OpenShift must prevent the installation of patches, service packs, device drivers, or operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.
<VulnDiscussion>Integrity of the OpenShift platform is handled by the cluster version operator. The cluster version operator will by default ...Rule Medium Severity -
SRG-APP-000400-CTR-000960
<GroupDescription></GroupDescription>Group -
OpenShift must set server token max age no greater than eight hours.
<VulnDiscussion>The setting for OAuth server token max age is used to control the maximum duration for which an issued OAuth access token rem...Rule Medium Severity -
SRG-APP-000414-CTR-001010
<GroupDescription></GroupDescription>Group -
Vulnerability scanning applications must implement privileged access authorization to all OpenShift components, containers, and container images for selected organization-defined vulnerability scanning activities.
<VulnDiscussion>OpenShift uses service accounts to provide applications running on or off the platform access to the API service using the en...Rule Medium Severity -
SRG-APP-000429-CTR-001060
<GroupDescription></GroupDescription>Group -
OpenShift keystore must implement encryption to prevent unauthorized disclosure of information at rest within the container platform.
<VulnDiscussion>By default, etcd data is not encrypted in OpenShift Container Platform. Enable etcd encryption for the cluster to provide an ...Rule Medium Severity -
SRG-APP-000435-CTR-001070
<GroupDescription></GroupDescription>Group -
OpenShift must protect against or limit the effects of all types of Denial-of-Service (DoS) attacks by employing organization-defined security safeguards by including a default resource quota.
<VulnDiscussion>DNS attacks that are internal to the container platform (exploited or otherwise malicious applications) can have a limited bl...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.